Pre-Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which two tools are used to deploy a Kubernetes environment for testing and development purposes? (Choose two.)

A.

OpenStack

B.

kind

C.

oc

D.

minikube

Full Access
Question # 5

Click to the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

The myvSRX instance is using a default image.

B.

The myvSRX instance is a part of a default network.

C.

The myvSRX instance is created using a custom flavor.

D.

The myvSRX instance is currently running.

Full Access
Question # 6

Which virtualization method requires less duplication of hardware resources?

A.

OS-level virtualization

B.

hardware-assisted virtualization

C.

full virtualization

D.

paravirtualization

Full Access
Question # 7

Which component of Kubernetes runs on all nodes and ensures that the containers are running in a pod?

A.

kubelet

B.

kube-proxy

C.

container runtime

D.

kube controller

Full Access
Question # 8

When considering OpenShift and Kubernetes, what are two unique resources of OpenShift? (Choose two.)

A.

routes

B.

build

C.

ingress

D.

services

Full Access
Question # 9

Which encapsulation protocol uses tunneling to provide a Layer 2 overlay over an underlying Layer 3 network?

A.

VLAN

B.

IPsec

C.

VXLAN

D.

GRE

Full Access
Question # 10

Which component of Kubernetes runs on each node maintaining network rules?

A.

container runtime

B.

kube-proxy

C.

kubelet

D.

kube controller

Full Access
Question # 11

You must install a basic Kubernetes cluster.

Which tool would you use in this situation?

A.

kubeadm

B.

kubectl apply

C.

kubectl create

D.

dashboard

Full Access
Question # 12

You are asked to deploy a cloud solution for a customer that requires strict control over their resources and data. The deployment must allow the customer to implement and manage precise security controls to protect their data.

Which cloud deployment model should be used in this situation?

A.

private cloud

B.

hybrid cloud

C.

dynamic cloud

D.

public cloud

Full Access
Question # 13

Which two statements are correct about Network Functions Virtualization (NFV)? (Choose two.)

A.

the NFV framework explains how VNFs fits into the whole solution.

B.

The NFV Infrastructure (NFVI) is a component of NFV.

C.

The NFV Infrastructure (NFVI) is not a component of NFV.

D.

The NFV framework is defined by the W3C.

Full Access
Question # 14

What are two Kubernetes worker node components? (Choose two.)

A.

kube-apiserver

B.

kubelet

C.

kube-scheduler

D.

kube-proxy

Full Access
Question # 15

Which operating system must be used for control plane machines in Red Hat OpenShift?

A.

Ubuntu

B.

Red Hat Enterprise Linux

C.

Red Hat CoreOS

D.

Centos

Full Access
Question # 16

Click the Exhibit button.

Referring to the exhibit, which port number would external users use to access the WEB application?

A.

80

B.

8080

C.

31000

D.

5000

Full Access
Question # 17

You must provide tunneling in the overlay that supports multipath capabilities.

Which two protocols provide this function? (Choose two.)

A.

MPLSoGRE

B.

VXLAN

C.

VPN

D.

MPLSoUDP

Full Access
Question # 18

Which Linux protection ring is the least privileged?

A.

0

B.

1

C.

2

D.

3

Full Access
Question # 19

Which term identifies to which network a virtual machine interface is connected?

A.

virtual network ID

B.

machine access control (MAC)

C.

Virtual Extensible LAN

D.

virtual tunnel endpoint (VTEP)

Full Access